Protect Taiwan Search Results

How To: Password protect databases with Microsoft Access

The Microsoft Office Access 2007 relational database manager enables information workers to quickly track and report information with ease thanks to its interactive design capabilities that do not require deep database knowledge. In this Microsoft Access video tutorial, you'll learn about creating a login form and password protecting your database.

How To: 3 Reasons You Still Need a Good Antivirus App on Android

Many people think antivirus apps are useless — why pay a subscription fee when most malware can be avoided with common sense? But the thing is, there were an estimated 3.5 million malicious Android apps discovered last year, with many of them making their way onto the Play Store. As this number continues to rise, can you truly depend on common sense to protect you?

How To: Export a protect to a high-resolution PDF in Adobe Photoshop CS5

In this clip, you'll learn how to save your images as PDFs when working in Photoshop CS5. Whether you're new to Adobe's popular raster graphics editor or a seasoned designer looking to better acquaint yourself with the new features and functions of the latest iteration of the application, you're sure to benefit from this free software tutorial. For more information, watch this video guide.

How To: Make your own butter from heavy cream

You can buy heavy cream or whipping cream at the grocery store, and then mix it in an electric mixer at home. Set your mixer to medium high (and make sure you've set up a shield of plastic wrap to protect against spatter!) and mix for five minutes. Then pour and drain, and you've got homemade butter!

How To: Erase temporary web files on a BlackBerry phone

Protect yourself against would-be snoopers. Learn how to clear your temp Internet files on a BlackBerry phone. This clip will show you how it's done. Whether you're the proud owner of a BlackBerry smartphone or are merely considering picking one up, you're sure to be well served by this video guide. For detailed information, including step-by-step instructions, take a look.

How To: Set a passcode on your Apple iPhone

Thwart would-be snoopers by protecting your Apple iPhone with a passcode. Learn how to set one up with this clip. It's easy! So easy, in fact, that this free video tutorial can present a detailed, step-by-step overview of the process in under a minute. For more information, and to get started setting up a passcode on your own iPhone, take a look!

How To: Selectively delete cookies in the Mozilla Firefox browser

Wish there were an easy way to protect one more browser cookies when sweeping out the rest? With the Selective Cookie Delete Firefox add-on it, it's easy! So easy, in fact, that this guide can present a complete overview of the extension and its various features in just over two minutes' time. Manage your cookies more effectively with this how-to.

How To: Surf the web anonymously using TOR and Privoxy

Want to protect your privacy when surfing the Internet? Thwart would-be snoopers with this free video guide from CNET TV, which presents an overview of a number of services and good practices one can observe to project one's privacy when using the web. For specifics, and to get started surfing the Internet anonymously yourself, watch this free video guide.

How To: Install & remove an iPhone cover

Want to protect your investment and add some personal style to your cell phone, but aren't quite sure how to install that cool new skin? We've got you covered - just check out this quick video on how to install and remove an iPhone case. If only getting ready for work could be so easy!

How To: Survive kidnapping

Domestic and foreign kidnapping is on the rise, and when in captivity, there are a few things that will keep you alive. Nearly 8,000 citizens are kidnapped each year, so while it may not feel like a likely possibility, protect yourself. Watch this video survival training tutorial and learn how to survive a kidnapping.

How To: Authorize and deauthorize computers in iTunes

Authorization allows you to copy your music store purchases to other computers and burn them to CD and protects the artists. Each computer you use to play your purchase must be authorized using your music store account. You can authorize up to 5 computers; yours is automatically authorized.

How To: Forge e-mail addresses

The purpose of this video is to show an e-mail security flaw using telnet that allows hackers to send e-mails using anyone's e-mail address. Thankfully, many major e-mail providers have software that blocks this. My intention is to make people aware of this flaw so that other e-mail providers can protect themselves as well.

How To: Build a Morse code telegraph

Keeping secrets out of the wrong hands warrants desperate measures—or maybe just sensical. If you have a secret, the best way to protect it is with a code—and the best way to transfer that secret message is via an electronic telegraph system. This video will show you how to make your own homemade electronic telegraph machine, so that you can send those encrypted Morse code messages to your friends without fear of prosecution.

How To: Snooper-proof your RFID chip loaded wallet

Did you know that malicious people can use scanners to read the Radio Frequency Identification (RFID) chips in your credit cards and identification documents and steal your personal information? Learn to protect your personal information from hackers and scammers with this simple method involving aluminum foil.

How To: PIN-Protect Photos, Log-in Credentials, Credit Card Info, Notes, & More with Keeply

In the weeks before Apple officially released iOS 8, consumers were abuzz over rumors that a new feature would password-protect your photos and text messages from prying eyes. Unfortunately, this ended up being untrue, though we did cover some alternatives to protecting your important information using some built-in features and a third-party app. Now, there's a new iOS app that can do it all.

How To: Prepare Bomb Pop bubble tea with tapioca pearls

Kids and young adults all over the world are crazy for this cold and refreshing new drink sensation. Bubble Tea started in Taiwan in the early 1980s, and now there are Bubble Tea shops on every street corner in Asia. Normally this drink is served in a clear glass with a wide straw in order to suck up the tapioca pearls that sink to the bottom. Watch this video tutorial to learn how to prepare Bomb Pop bubble tea.

How To: Fold a bag of chips with an airtight seal without using a bag clip

If you like chips and don't have a massive overeating problem, you've probably had this problem: you're eaten half your bag of chips, but you don't have a bag clip to seal the bag and protect the freshness of your chips! Enter this video, in which a charming young Israeli teaches us how to fold a chip bag with an airtight seal without using a bag clip. You'll never have to eat a stale chip again!

How To: Help seeds grow faster by nicking them

Most seeds have a thick outer shell meant to protect the soft inner seed. 'Nicking' is a gardening technique to remove the outer shell so the seed will germinate faster in your garden after planting. You can use water, sandpaper, a nail file or even sulfuric acid to nick your seeds.

How To: Stop other people from checking you in with Facebook Places

Protect your privacy by disabling Facebook Places once and for all. Whether you're completely new to the Facebook's popular social networking site or simply require a small amount of clarification on how to deal with the Places feature, you're sure to benefit from this helpful video guide. For more information, including detailed, step-by-step instructions, take a look.

How To: Create a private Twitter profile

What do President Obama, the Dalai Lama and Justin Bieber have in common? Why, they're all on Twitter, of course. Join the party. Whether you're new to Twitter's popular microblogging application or just missed a few of the essentials along the way, you're sure to benefit from this free video tutorial, which offers detailed instructions on how to create a protected Twitter feed.

How To: Anonymize your searches via GoogleSharing for Firefox

Need some help figuring out how to anonymize your Google searches? With the GoogleSharing Firefox addon, it's easy! So easy, in fact, that this home computing how-to from the folks at CNET TV can present a complete overview of the process in just over a minute and a half. For detailed instructions, and to get started protecting your own privacy online, watch this helpful guide.